New Stories

From FRAUD CONTROL

LexisNexis Takes Identity Risk from Physical/Biometric to Network-Behavior-Sharing with 7,000 Digital Businesses

interview with Jason Lane-Sellers

LexisNexis Takes Identity Risk from Physical/Biometric to Network-Behavior-Sharing with 7,000 Digital Businesses

An partner-network enabled identity  verification system is used by some of the largest financial and e-commerce firms in the world.  Learn how this new paradigm may revolutionize current identity and fraud control operations.

From ANALYTICS

Subex’s COO: Machine Learning, Disruption & Adaptive Biz Models to Impact Telecoms in 2020

interview with Shankar Roddam

In our dynamic and digital-driven world, telecoms and enterprises face many business risks.  So what can you do to plot a successful future?  Hear 5 prophecies on 2020 telecom trends from the Chief Operating Officer of Subex.

From FRAUD CONTROL

Lanck Telecom Raises Fraud Alarm for International Brands, Enterprise Call Centers & Carriers: Beware of Wangiri 2.0

interview with Sergey Okhrimenko

An international wholesaler gives details about a new traffic pumping fraud dubbed Wangiri 2.0.  The fraud is hard to detect and targets businesses who do lots of international calling.

More Stories

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month From SECURITY

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month

interview with Moshe Elias

Protecting mobile users from online threats is a major opportunity for telecoms and a service very much in demand.  Learn about the adoption, challenges, and marketing innovations driving mobile device cybersecurity protection.

From FRAUD CONTROL

A Black Swan Solution Guide: The Value of an Authoritative Database of Global Telephone Numbers in Fraud Control

interview with John Haraburda

Learn about an authoritative database of allocated numbers and special number ranges in every country of the world.  The expert explains how this database adds value to any FMS or fraud analyst team.

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services From SECURITY

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services

interview with Stephen Spellicy

How high-speed communications, advanced security and analytics technology gets delivered to the IoT OEMs and telecom providers.  Learn why security, performance, cost and reliability are key IoT challenges.

A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow From REVENUE ASSURE

A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow

interview with Carla Cardoso & Bernado Lucas & Thomas Steagall

Leading risk management consultants explain their mission and walk-through RA, subscription fraud, and collections cases.  They also explain how analytics and machine learning can supplement process optimization.

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients From SECURITY

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

interview with Kiran Zachariah

A leader in IoT security monitoring and protection services explains the many challenges of IoT security and how his firm is exploiting its deep research and honeypots to protect telecom, industrial, and automotive OEM clients.

Moments Matter in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers From FRAUD CONTROL

Moments Matter in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers

interview with Kathy Timko

Matching the porting history of a telephone number to a carrier of record is now crucial to identity/credit checks by financial, healthcare, and other firms in the U.S. Learn how fraudsters exploit carrier porting processes to perform account takeover in 10 minutes; and why freshly updated porting data is needed to combat $17 billion in identity fraud.

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight From FRAUD CONTROL

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight

interview with Miguel Carrero

Security-breach-driven fraud is on the increase as fraudsters gain deeper  knowledge of telecom spheres such as roaming.  Using five fraud cases, an expert shows how advanced signaling techniques are taking fraud control to a higher level.

Black Swan Solution Guides & Papers

Other Recent Stories